• DocumentCode
    479255
  • Title

    Research on Key Technologies of Network Security Management Policy

  • Author

    Tang, Chenghua ; Yu, Shunzheng

  • Author_Institution
    Dept. of Electr. & Commun. Eng., Sun Yat-Sen Univ., Guangzhou
  • fYear
    2008
  • fDate
    12-14 Oct. 2008
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    For purpose of managing network security policy duly and flexibly in the complex network environment, and resolving its issue efficiency, this paper proposes network security policy self-adaptive management and distribution model. An incident triggered, policy-driven and self-adaptive management mechanism is established, and the impact of safety equipment or user requests, such as system resources found on the flow control can be calculated automatically. The distribution model is given to response policy request rapidly, take the appropriate policy dissemination methods, and reduce PDP computing tasks, system resource consumption, as well as between the PDP and PEP data transmission volume, which introduces the concepts of issue affecting factors, security domain addresses allocation, etc. The effectiveness of the proposed model and algorithms is proved by experiments.
  • Keywords
    computer networks; telecommunication network management; telecommunication security; distribution model; network security management policy; self-adaptive management; Automatic control; Complex networks; Control systems; Data communication; Data security; Distributed computing; Environmental management; Resource management; Safety devices; Technology management;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on
  • Conference_Location
    Dalian
  • Print_ISBN
    978-1-4244-2107-7
  • Electronic_ISBN
    978-1-4244-2108-4
  • Type

    conf

  • DOI
    10.1109/WiCom.2008.2919
  • Filename
    4681108